Home

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: zynqmp: Add an OP-TEE node to the device tree" This reverts commit 06d22ed6b6635b17551f386b50bb5aaff9b75fbe. OP-TEE logic in U-Boot automatically injects a reserved-memory node along with optee firmware node to kernel device tree. The injection logic is dependent on that there is no manually defined optee node. Having the node in zynqmp.dtsi effectively breaks OP-TEE's insertion of the reserved-memory node, causing memory access violations during runtime.

PUBLISHED Reserved 2026-05-08 | Published 2026-05-08 | Updated 2026-05-08 | Assigner Linux

Product status

Default status
unaffected

06d22ed6b6635b17551f386b50bb5aaff9b75fbe (git) before eece81eeda10eb42c687399fb5aa69977ae15664
affected

06d22ed6b6635b17551f386b50bb5aaff9b75fbe (git) before 3983ef126e439900bbf419724a9759863c146660
affected

06d22ed6b6635b17551f386b50bb5aaff9b75fbe (git) before 2a833c730d4e8d1cc10953270ce0f3a156145d81
affected

06d22ed6b6635b17551f386b50bb5aaff9b75fbe (git) before c197179990124f991fca220d97fac56779a02c6d
affected

Default status
affected

6.9
affected

Any version before 6.9
unaffected

6.12.75 (semver)
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/eece81eeda10eb42c687399fb5aa69977ae15664

git.kernel.org/...c/3983ef126e439900bbf419724a9759863c146660

git.kernel.org/...c/2a833c730d4e8d1cc10953270ce0f3a156145d81

git.kernel.org/...c/c197179990124f991fca220d97fac56779a02c6d

cve.org (CVE-2025-71300)

nvd.nist.gov (CVE-2025-71300)

Download JSON